2021
DOI: 10.1109/lcomm.2021.3063673
|View full text |Cite
|
Sign up to set email alerts
|

On the Performance of Secure Underlay Cognitive Radio Networks With Energy Harvesting and Dual-Antenna Selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Towards this end, the relay selection approach was proposed for guarding wireless transmissions against eavesdropping attacks. The authors in [27] studied the PLS of energy harvesting for cognitive radio networks using the cooperative relaying technique. In [28], the PLS of cooperative dual-hop NOMA for internet-of-thing networks was investigated.…”
Section: A Related Workmentioning
confidence: 99%
“…Towards this end, the relay selection approach was proposed for guarding wireless transmissions against eavesdropping attacks. The authors in [27] studied the PLS of energy harvesting for cognitive radio networks using the cooperative relaying technique. In [28], the PLS of cooperative dual-hop NOMA for internet-of-thing networks was investigated.…”
Section: A Related Workmentioning
confidence: 99%
“…Recently, the authors in [34] have investigated the tradeoff between reliability and security for non-orthogonal multiple access enabled cognitive radio networks. The authors in [35] have studied the secrecy performance of energy harvesting coupled cognitive radio networks. Furthermore, the authors in [36] have evaluated the performance of cognitive wiretap networks under α − µ fading channels.…”
Section: A Related Workmentioning
confidence: 99%
“…Similarly, we can evaluate M 2 and M 3 . Consequently, invoking the resultant expressions of M 1 , M 2 , and M 3 into (60), we can express C sec,1 as presented in (35). Moreover, from (33), we can express C sec,2 into its equivalent integral form as…”
Section: Appendix F Proof Of Theoremmentioning
confidence: 99%
“…For instance, several reported works have investigated the integration of EH techniques in underlay CRNs (see [15], [16], [17], [18], and [19] and the references therein). From a security point of view, certain papers have focused on improving the security of underlay CRNs through EH, such as in [12], [14], [20], and [21], due to the elevation in the security concerns in 5G and beyond networks [22], [23]. In contrast to the underlay mode, the interference from the secondary transmissions on the primary network can be counteracted in the overlay mode.…”
Section: Introductionmentioning
confidence: 99%